Category Archive

Telecommunications and old-school postal systems use a hierarchy of identifying characteristics (number, exchange, zip or area code, state or country code, etc.) to break the process of transmitting messages into manageable steps, each of which may be handled by mechanisms appropriate to a given stage (mailbox, local sorting office, etc.). The same holds true for network and internet communications, where … Read More

In the realm of cyber-security, it’s sometimes the case that what works as a defense or deterrent in preserving the integrity of computer networks may also be turned against them as a weapon. This is certainly true of sniffing. What is Sniffing? Sniffing (or packet sniffing) is the process of capturing packets of data as they flow across a computer … Read More

Network administrators and Information Security Officers (ISOs) have a tough job monitoring and marshaling the resources of corporate infrastructure – especially at a time when enterprises are expanding their operations beyond localized data centers and campuses to dispersed networks having the potential to span the globe. Fortunately, there’s a standardized set of mechanisms that can streamline and rationalize network management … Read More

A network exists when two or more computing systems are linked in a mutually dependent relationship that enables them to share resources and/or information. The connection between systems may be a physical one – as is the case with a traditional private data center, where banks of servers and systems are connected by cables, routers, and switches. It may also … Read More